Monero needs your help: OSPEAD - Fortifying Monero Against Statistical Attack (ccs.getmonero.org)

Darknetlive

No Prison for Ex-Cop Who Used Tor to View Child Abuse Material

A former Kent Police officer received a suspended prison sentence despite having child abuse content in his possession at the time of his arrest.

Thomas Blant, 38, a former police constable, was sentenced to one year in prison, suspended for two years. Blant admitted that he had used the Tor browser to access child abuse content.

A picture of Thomas Blant, 38.

Thomas Blant, 38.

[DNL Note: The NCA claims they identified that Blant was using Tor to access a CSA wesbite. How did they associate his Tor traffic with his home I.P. address? ]

Investigators with the National Crime Agency (NCA) established that someone using an I.P. address associated with Blant’s home was accessing a child pornography site via Tor. Police raided his home on January 19, 2020. During the raid, investigators seized several electronic devices including Blant’s phone and laptop.

Police questioned Blant and his wife. Blant’s wife provided the police that she had been working at the time the child abuse site had been accessed. After hearing this, the police released her. The police learned that Blant was off-duty on the day the site had been accessed. Police arrested Blant. Kent Police suspended Blant after his arrest. He had worked as a constable for six years.

While analyzing Blant’s laptop, investigators found the Tor Browser Bundle and a so-called “computer cleaning application.” Investigators recovered 17 category A and C child abuse images from the laptop. They found four more images on one of Blant’s phones.

Blant pleaded guilty to two counts of possession of child abuse images at the Folkestone Magistrates Court on July 22, 2021. The guilty plea resulted in his dismissal from the Kent Police.

Blant appeared before Judge Philip Statman at Maidstone Crown Court on October 6, 2021, for his sentencing hearing. He was sentenced to one year in prison suspended for two years. Judge Statman also ordered a five-year sexual harm prevention order and placed him on the sex offenders register for 10 years.

Speaking following Blant’s sentence NCA’s Martin Ludlow said:

“Blant’s offending is an outrageous misuse of trust. His role as a police officer was to protect the public. Instead, he sought out images of child abuse for his sexual gratification. Offenders who view such material online only encourage those willing to sexually abuse children in the real world. Combatting this threat remains one of the highest priorities for the NCA. We are committed to targeting the most dangerous offenders and those who, like Blant, go to great lengths to hide their activity, believing they can operate with impunity online. As this investigation shows, there is nowhere to hide. We will use all of the tools at our disposal to identify those who pose a sexual threat to children and ensure they are brought to justice.”

13 Comments
Anyone claiming to be a vendor is either a scammer or a fed. Click links at your own risk.
finding Zero day
40d8b910 Mon, Oct 11, 2021

HOW did his ip get exposed

hotjava
147e17f0 Mon, Oct 11, 2021

Probably javascript

Meatballs
b1d2fa30 Tue, Oct 12, 2021

They may have put malware in the videos that unmasked the real IP address

Greg
b2d419b0 Tue, Oct 12, 2021

How tho? Maybe if it was an executable or something?

This is a serious issue tho, very scary @W@

Boomer
c27aeb10 Tue, Oct 12, 2021

I once read feds put executable file alongside actual CP hoping pedo will accidentally click it but I doubt it was like that in this situation. I have written possible scenarios but seems like my post got flagged and has to wait for manual approval.

Boomer
1246e2d0 Tue, Oct 12, 2021

Feds can't simply deanonymize Tor users, it's incredibly hard and when they do it's mostly because of user error (in very rare cases due to exploit.) This news is very misleading. What could possibly happen: -dude accesses pedo site via Tor but downloaded CSAM without Tor (it's usually hosted on external clearnet websites) -like Meatballs said, malware (it's very rare to exploit media player with non-executable file so I doubt it, unless there was video file + malware file and he clicked latter though it's not common to find something like that) -dude accessed FBI honeypot (I'm not sure they exist but dude might not be savvy enough to know about legit links and found honeypot so who knows) and played "kiddie_porn.mp4.exe" (as I said not likely but it's plausible) -dude shared CP on clearnet in some way like messaging app (but article would state that though they deliberately don't say how exactly he was caught) -dude accessed pedo site on phone and files got synchronized with cloud and flagged (they mention laptop but there were files on phone too so he accessed CSA on both? Transferred from laptop to phone? Maybe got flagged on Windows laptop with OneDrive?) -dude used work laptop that had spyware/bossware (very plausible but we don't have details) Dude was tech savvy enough to use Tor and have “computer cleaning application” (like CCleaner lol) but not enough to encrypt drive, not get CSA on phone and ultimately not to get caught. I think it's scare news to discourage Tor use and make people believe feds are omnipotent (they are not.)

RottenGirl
7340a280 Thu, Oct 14, 2021

Thanks, very interesting

dollargeneral
d65319f0 Wed, Oct 13, 2021

There used to be a way to embed html/javascript into windows media files back in the day. I wonder if something like that was used.

alpha02
3552aac0 Fri, Oct 15, 2021

LOL! A pedo AND a pig? He better get used to taking BBC, might as well just execute him for his own safety.

SexyBedwear
ff036630 Sun, Oct 17, 2021

i hope that piece of shit gets his skull beaten in

Stormy
0e389fe0 Sun, Oct 24, 2021

LEOs can and do subpeona TelCos if they suspect nonce activity. Unless a bridge is inuse I guess TOR circuit IP addresses can be tracked? That's all they need. There must have been something totip them off though - probably the content on his phone - much harder to hide than TOR on a PC. From my experience with LEOs,, they are abut as IT litterate as your average luddite. He was probs sharing a vid with his noncey mates. Shame he didn't get time, fucker deserves it.

Stormy
2026c600 Sun, Oct 24, 2021

LEOs can and do subpeona TelCos if they suspect nonce activity. Unless a bridge is inuse I guess TOR circuit IP addresses can be tracked? That's all they need. There must have been something totip them off though - probably the content on his phone - much harder to hide than TOR on a PC. From my experience with LEOs,, they are abut as IT litterate as your average luddite. He was probs sharing a vid with his noncey mates. Shame he didn't get time, fucker deserves it.

AngrySlug5000
5e6bcf50 Sun, Nov 7, 2021

I work for a management and information technology firm in the greater DC area. That’s all I can legally say. But I can leave you with a riddle of sorts.

“Under the RAINBOW you will find a DRUNK pair of Irishmen. These two lads collect what the WINDS blow by. It is said that they have collected a STELLAR collection from the all those windy days. A collection of lads who know how to peel an onion so perfectly that you would swear they started at on the inside. But don’t be fooled they wasted ZERO DAYS learning the skill, and now they do it for thrill. It’s only a matter of time before the bucket spills”

Be smart - remember that most parasites enter undetected and then attack from the inside. if you look you will see what the riddle says and then you will understand better about how his IP was exposed.

New comments are disabled after one month in an attempt to limit spam.

See Also